drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in ktelnetd
Name: |
Pufferüberlauf in ktelnetd |
|
ID: |
openSUSE-SU-2012:0019-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE 11.3, openSUSE 11.4 |
|
Datum: |
Do, 5. Januar 2012, 15:52 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862 |
|
Applikationen: |
ktelnetd |
|
Originalnachricht |
openSUSE Security Update: krb5-appl: Fixed remote buffer overflow in ktelnetd ______________________________________________________________________________
Announcement ID: openSUSE-SU-2012:0019-1 Rating: important References: #698471 #738632 Cross-References: CVE-2011-4862 Affected Products: openSUSE 11.4 openSUSE 11.3 ______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update of krb5 applications fixes two security issues.
CVE-2011-4862: A remote code execution in the kerberized telnet daemon was fixed. (This only affects the ktelnetd from the krb5-appl RPM, not the regular telnetd supplied by SUSE.)
CVE-2011-1526 / MITKRB5-SA-2011-005: Fixed krb5 ftpd unauthorized file access problems.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch krb5-appl-5593
- openSUSE 11.3:
zypper in -t patch krb5-appl-5593
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
krb5-appl-clients-1.0-7.12.1 krb5-appl-servers-1.0-7.12.1
- openSUSE 11.3 (i586 x86_64):
krb5-appl-clients-1.0-4.5.1 krb5-appl-servers-1.0-4.5.1
References:
http://support.novell.com/security/cve/CVE-2011-4862.html https://bugzilla.novell.com/698471 https://bugzilla.novell.com/738632
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|